Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Corellium Responds to Apple’s Copyright Infringement Lawsuit

Corellium, the Florida-based virtualization company sued by Apple for creating replicas of the iOS operating system, has responded to the tech giant’s lawsuit.

Corellium, the Florida-based virtualization company sued by Apple for creating replicas of the iOS operating system, has responded to the tech giant’s lawsuit.

Corellium provides a virtual version of the iPhone, including the graphical user interface and the underlying code for the iOS operating system and the iTunes software. This can be very useful for finding vulnerabilities and other types of bugs, as well as for testing the functionality of mobile applications on different versions of the iPhone and iOS.

However, the company was sued by Apple, which claims its practices represent copyright infringement. Apple is particularly displeased with Corellium allegedly offering a “private” installation of its product for $1 million per year, and encouraging its users to sell the vulnerabilities they find to the highest bidder rather than disclosing them to Apple.

Corellium this week responded to Apple’s lawsuit, accusing the tech giant of owing it $300,000 for iOS and macOS vulnerabilities reported through its bug bounty program. The company said Apple did not have a problem with its products when they were being used to find security holes submitted to its bug bounty program.

In a heavily redacted 29-page court document, Corellium claims Apple is actually trying to gain full control over how security research is conducted and who is able to conduct such research, including through its lawsuit and the recent announcement that security researchers will be given iPhones specifically configured for security testing.

Corellium says its virtualization technology makes security research much more efficient — if a virtual device is bricked during testing it can be easily restored and these devices can be paused at any time for detailed analysis — and it claims to have made fair use of Apple’s technology. On the other hand, Corellium believes Apple’s behavior “amounts to unfair business practices that must be put to an end by the Court.”

“Apple was not only aware of Corellium’s technology for several years, but actually encouraged its development,” Corellium said. “Rather than tell the real story, Apple paints Corellium as a bad actor, unscrupulously peddling its product to anyone for any reason. But Corellium does not license its platform to anyone. Its end users include well-known and well-respected financial institutions, government agencies, and security researchers.”

It added, “Corellium does not use iOS in its entirety or merely replicate iOS for the same purposes as Apple. Instead, Corellium uses its own proprietary software to facilitate executing iOS on different hardware. When iOS is loaded onto the Corellium platform, it is not only transformed to enable it to run on different hardware, but it is also integrated with third-party tools to improve the utility of the platform for developers. Apple cannot dispute that Corellium implements its own original code and virtual machine in conjunction with third party tools.”

Advertisement. Scroll to continue reading.

Related: Lawmakers Concerned About Apple’s Handling of FaceTime Spying Bug

Related: ‘Unpatchable’ iOS Bootrom Exploit Allows Jailbreaking of Many iPhones

Related: Apple Patches FaceTime Spying Vulnerability

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem